[
https://issues.apache.org/jira/browse/PHOENIX-6576?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Istvan Toth reassigned PHOENIX-6576:
------------------------------------
Assignee: Istvan Toth
> Do not use guava's Files.createTempDir()
> ----------------------------------------
>
> Key: PHOENIX-6576
> URL: https://issues.apache.org/jira/browse/PHOENIX-6576
> Project: Phoenix
> Issue Type: Bug
> Reporter: lujie
> Assignee: Istvan Toth
> Priority: Major
> Labels: beginner
>
> see [https://www.cvedetails.com/cve/CVE-2020-8908/]
> A temp directory creation vulnerability exists in all versions of Guava,
> allowing an attacker with access to the machine to potentially access data in
> a temporary directory created by the Guava API
> com.google.common.io.Files.createTempDir(). By default, on unix-like systems,
> the created directory is world-readable (readable by an attacker with access
> to the system). The method in question has been marked
> [@deprecated|https://github.com/deprecated] in versions 30.0 and later and
> should not be used. For Android developers, we recommend choosing a temporary
> directory API provided by Android, such as context.getCacheDir(). For other
> Java developers, we recommend migrating to the Java 7 API
> java.nio.file.Files.createTempDirectory() which explicitly configures
> permissions of 700, or configuring the Java runtime's java.io.tmpdir system
> property to point to a location whose permissions are appropriately
> configured.
--
This message was sent by Atlassian Jira
(v8.20.1#820001)